beyond

Symantec goes beyond the desktop with Norton Everywhere

Symantec goes beyond the desktop with Norton Everywhere

New security software and services for range of devices.
Iain Thomson May 28 2010 1:12PM Security
Opinion: Moving beyond Web 2.0

Opinion: Moving beyond Web 2.0

Start calling it Web Squared.
Chrstopher Barnatt Oct 15 2009 6:43AM Strategy
Google security tool goes beyond the network

Google security tool goes beyond the network

Google has expanded its web-based security application which allows administrators to set policies that limit user access to sites and monitor browsing habits..
Shaun Nichols May 12 2008 7:30AM Security
Clarke inspires science from beyond the grave

Clarke inspires science from beyond the grave

The impact of science fiction writer Arthur C Clarke is still being felt, following the news that two more of his ideas are being researched for real..
Iain Thomson Apr 25 2008 12:58PM Hardware
Smartphone security beyond office walls

Smartphone security beyond office walls

With data becoming more mobile than ever, it is critical that companies have a pervasive security strategy across the corporate network.
Matt Bancroft, CMO, Mformation Technologies Inc. Apr 3 2008 11:42AM Security
Phishers cast nets beyond PayPal

Phishers cast nets beyond PayPal

Security experts have reported a "dramatic reduction" in the proportion of phishing emails targeting customers of PayPal and its parent company eBay..
Robert Jaques Oct 17 2007 7:21AM Security
Astronomers find water on planet beyond solar system

Astronomers find water on planet beyond solar system

But not a drop to drink.
Robert Jaques Jul 16 2007 5:13AM Software
Wikipedia 'broken beyond repair' says co-founder

Wikipedia 'broken beyond repair' says co-founder

The co-founder of Wikipedia has said the site is ‘broken beyond repair' and criticised its supporters...
Iain Thomson Apr 13 2007 1:13PM Software
Moving beyond IT alignment

Moving beyond IT alignment

Despite the obstacles, IT must provide a flexible infrastructure to support strategic innovation. This is best accomplished through a governance framework that incorporates five requirements.
Staff Writers Apr 2 2007 3:34PM Strategy
Training for security beyond the PC and network

Training for security beyond the PC and network

Threats to information security are appearing more frequently and are of greater magnitude than ever before.
Larry Kovnat, Mar 22 2007 6:48AM Security
Evolution of employee monitoring stretches far beyond email

Evolution of employee monitoring stretches far beyond email

The concept of organisations keeping a watchful eye on employees during company hours is nothing new.
Sandra Vaughan, Feb 26 2007 5:35AM Security
Beyond v1@gr@ - spam's new image

Beyond v1@gr@ - spam's new image

We've all heard about the recent rise in spam, and while I dislike spam as much as the next person, I recently received a spam message that got me quite excited.
Andrew Graydon, Jan 2 2007 11:05PM Security
QuickTime flaw could go beyond MySpace

QuickTime flaw could go beyond MySpace

The QuickTime security hole that enabled a phishing worm to attack users of social networking site MySpace is leaving more users and websites vulnerable than was first thought.
Shaun Nichols Dec 13 2006 9:06AM Security
Researchers look beyond silicon for next-gen transistors

Researchers look beyond silicon for next-gen transistors

New technology needed to maintain current pace of development.
Robert Jaques Dec 13 2006 9:06AM Hardware
Beyond patch management

Beyond patch management

During my recent conversations with industry analysts about evolving security threats, the issue of security settings has become a main topic of discussion. Initially, anti-virus was adequate enough to protect systems from outside threats, but it soon became a service with a continual addition of virus signatures.
Vijay Adusumilli, Oct 16 2006 10:26PM Security
Application security: Beyond the buzzwords

Application security: Beyond the buzzwords

One of the emerging buzzwords of 2005 is "application security" but many managers still don’t have a clear picture of what the term means. Security vendors are not helping as they all clamor for a piece of this emerging budget line-item with very diverse offerings.
Andrew Stern Jan 23 2006 12:55PM Security
ID theft: beyond fear to opportunity

ID theft: beyond fear to opportunity

In the last few months, it has become nearly impossible to read a magazine or watch television without coming across a story about identity theft. Identity theft is causing a significant amount of angst among consumers and businesses alike.
Sara Gates Jan 13 2006 7:54PM Security
To London and beyond

To London and beyond

The Madrid train bombs have raised fears that it is only a matter of when – rather than if – there will be a serious terrorist incident elsewhere. For my own part, I honestly believe that one will happen within two years – and that it will have a massive impact on how business continuity (BC) and disaster recovery (DR) is viewed in this country.
Neil Stephenson Aug 3 2004 10:51AM Security
Intel moves beyond megahertz

Intel moves beyond megahertz

Chip giant Intel has announced that it would introduce a model numbering scheme across its consumer CPU range.
Staff Writers , John Gillooly Mar 22 2004 12:00AM Hardware

Log In

  |  Forgot your password?